We describe the experience of creating and developing a postgraduate computing provision, in response to a set of different learning needs from large cohorts of students recruited from the Indian Sub-continent. Amongst a number of changes... more
We describe the experience of creating and developing a postgraduate computing provision, in response to a set of different learning needs from large cohorts of students recruited from the Indian Sub-continent. Amongst a number of changes to the curriculum and delivery, two particular aspects of the teaching stand-out in terms of their contribution to enhancement. First, a shift in emphasis to teach software design over implementation. Second, a delivery ethos was modified to encourage professional development through the facilitation of student-led curricula, leading to a considerable improvement in student participation. Over the course of a ten-year period, student attainment and engagement increased significantly.
Experiences and lessons from the practical interoperation of CharGer with SeSAm Neil Brady, Simon Polovina, Dharmendra Shadija and Richard Hill Web & Multi-Agents Research Group Faculty of Arts, Computing, Engineering & Sciences Sheffield... more
Experiences and lessons from the practical interoperation of CharGer with SeSAm Neil Brady, Simon Polovina, Dharmendra Shadija and Richard Hill Web & Multi-Agents Research Group Faculty of Arts, Computing, Engineering & Sciences Sheffield Hallam University ...
An approach to teaching encryption is described in which an XOR encryption algorithm is used to demonstrate simple encryption concepts for E-Business payment with credit cards. Small groups of undergraduate and postgraduate learners... more
An approach to teaching encryption is described in which an XOR encryption algorithm is used to demonstrate simple encryption concepts for E-Business payment with credit cards. Small groups of undergraduate and postgraduate learners manually encrypt a four-character word, and then exchange the encrypted data with another group. Each group then attempts to decrypt the data as quickly as possible. Learners show an increased understanding of the encryption process and demonstrate greater success when programming in subsequent tutorials. This work is currently being developed to enhance the teaching of asymmetric Public Key encryption.
Nowadays, most of the economic activities and business models are driven by the unprecedented evolution of theories and technologies. The impregnation of these achievements into our society is present everywhere, and it is only question... more
Nowadays, most of the economic activities and business models are driven by the unprecedented evolution of theories and technologies. The impregnation of these achievements into our society is present everywhere, and it is only question of user education and business models optimization towards a digital society. Progress in cognitive science, knowledge acquisition, representation, and processing helped to deal with imprecise, uncertain or incomplete information. Management of geographical and temporal information becomes a challenge, in terms of volume, speed, semantic, decision, and delivery. Information technologies allow optimization in searching an interpreting data, yet special constraints imposed by the digital society require on-demand, ethics, and legal aspects, as well as user privacy and safety. The event was very competitive in its selection process and very well perceived by the international scientific and industrial communities. As such, it is attracting excellent con...
ABSTRACT The internationalisation of Higher Education is a major thrust for EU Universities. This article examines how the curriculum can be designed to not only accommodate different and disparate cultures, but also enhance the cultural... more
ABSTRACT The internationalisation of Higher Education is a major thrust for EU Universities. This article examines how the curriculum can be designed to not only accommodate different and disparate cultures, but also enhance the cultural experience for all concerned. Using Peirce’s writings on critical thinking, we describe how a research-informed curriculum can deliver an improved experience for postgraduate learners.
Culture, Critical Thinking and Computing Richard Hill1 and Dharmendra Shadija2 1 School of Computing University of Derby, Derby, DE22 1GB, UK. r. hill@ derby. ac. uk 2 Department of Computing Sheffield Hallam University Sheffield, S1 1WB,... more
Culture, Critical Thinking and Computing Richard Hill1 and Dharmendra Shadija2 1 School of Computing University of Derby, Derby, DE22 1GB, UK. r. hill@ derby. ac. uk 2 Department of Computing Sheffield Hallam University Sheffield, S1 1WB, UK. d. shadija@ shu. ac. uk ...
Microservice Architectures (MA) have the potential to increase the agility of software development. In an era where businesses require software applications to evolve to support software emerging requirements, particularly for Internet of... more
Microservice Architectures (MA) have the potential to increase the agility of software development. In an era where businesses require software applications to evolve to support software emerging requirements, particularly for Internet of Things (IoT) applications, we examine the issue of microservice granularity and explore its effect upon application latency. Two approaches to microservice deployment are simulated; the first with microservices in a single container, and the second with microservices partitioned across separate containers. We observed a neglibible increase in service latency for the multiple container deployment over a single container.
Microservice architectures (MA) are composed of loosely coupled, course-grained services that emphasise resilience and autonomy, enabling more scalable applications to be developed. Such architectures are more tolerant of changing demands... more
Microservice architectures (MA) are composed of loosely coupled, course-grained services that emphasise resilience and autonomy, enabling more scalable applications to be developed. Such architectures are more tolerant of changing demands from users and enterprises, in response to emerging technologies and their associated influences upon human interaction and behaviour. This article looks at microservices in the Internet of Things (IoT) through the lens of agency, and using an example in the community health care domain explores how a complex application scenario (both in terms of software and hardware interactions) might be modelled.
An approach to teaching encryption is described in which an XOR encryption algorithm is used to demonstrate simple encryption concepts for E-Business payment with credit cards. Small groups of undergraduate and postgraduate learners... more
An approach to teaching encryption is described in which an XOR encryption algorithm is used to demonstrate simple encryption concepts for E-Business payment with credit cards. Small groups of undergraduate and postgraduate learners manually encrypt a four-...
This paper discusses the roles that devices which we term templates and tariffs can play in controlling empirical studies of programmers. Having been involved in a number of empirical investigations of programming, some based on... more
This paper discusses the roles that devices which we term templates and tariffs can play in controlling empirical studies of programmers. Having been involved in a number of empirical investigations of programming, some based on observational studies of large groups and others based on protocols of individual subjects, we briefly consider problems which are inherent in these various methodologies and consider how in our recent work, we have attempted to ameliorate some of these problems using templates and a number of tariffs. We outline the nature and mode of using these methods and suggest that they can play important roles in giving us a better picture of program construction.